Stay up to date with all things privacy and identity

Gain insight on industry updates, expert opinions, product announcements, and so much more.

Featured posts

MySudo Desktop is Here: 3 Good Reasons to Get it Now! 

MySudo is coming for your desktop!  We’re excited to announce the release of MySudo Desktop, a new companion product for MySudo app.   MySudo Desktop is the next evolution of our…

Is an App a Wallet or is a Wallet an App?

By Steve McCown Today’s news is filled with articles and discussions about digital identity, credentials, passwordless logins, etc. Inevitably, articles gravitate towards digital wallets, some…

4 Quick Things You Can Do to Protect Your Personal Information This Data Privacy Day

Make this year’s Data Privacy Day the day you take back control of your personal information online. Data breaches are at an all-time high and…

Anonyome’s DI Mobile Wallet SDK Now Offers Even More DI Trust Infrastructure Options

With our bleeding-edge 3.0 release of the Anonyome Labs decentralized identity (DI) mobile wallet SDK just coming hot off the press, we’re excited to announce that we’ve…

Search Blog

MySudo Virtual Cards Are Here

Every time you go online, you leave a trail of personal information that data brokers and criminals can scoop up like candy.  Every purchase, every…

What Is Whale Phishing?

Much like spear phishing (which generally targets an individual), whale phishing is a strategic scam specifically aimed at a high-value, powerful, or prominent target. This…

What Is “Vishing” or Phone Phishing?

As technology develops, so does the ingenuity of attacks on sensitive information. Cybercriminals use electronic communication to appear legitimate and trustworthy while asking for personal…

What Is Spear Phishing?

Phishing is a common type of scam aimed at stealing personal information from victims. The techniques phishers employ are becoming more sophisticated and varied. Considering…

Where Will Privacy Be in 10 Years?

When the International Association of Privacy Professionals recently released Visions of Privacy, a future-looking anthology of contributions from privacy thought-leaders around the world, we got…

How Anonyome Uses the Transparent Data Use Dial

One of the great things about the privacy and cyber security space is how it brings together a diverse group of people who share similar…

Have I Been Hacked? How to Tell If You Have A Compromised Account and What to Do About It

Whether it’s a social media account or bank account, it seems that almost everyone gets hacked at some point or another. This article will explain…

What Is the Google Docs Phishing Scam?

Cybercriminals continue developing frightening levels of sophistication into their scams. One particularly cunning example is the Google Docs phishing scam, which proved how everyone —…

Safely sell your stuff with MySudo

Selling items online is convenient, but can also feel risky. MySudo is a great tool for selling your old couch, bike, iPhone online or other…

What Is Phishing and How to Protect Yourself Against Phishing Attacks

Spam emails and texts are an ever-evolving annoyance. Filters and other methods of blocking spam are constantly being developed, but the spammers simply improve their…

How I Use a Privacy App in the Real World

Until recently, I fell into the group of people who have an ever-increasing number of emails piling up in their inbox every day. Having three…

What Is Identity Theft, and Can It Be Avoided?

Sometimes referred to as identity fraud, identity theft occurs when someone uses your personal information — such as your Social Security Number or driver’s license…

Listen to our podcast

Our podcast makes privacy approachable with expert guests, thought-provoking discussions, and real-life stories.

Meet us
here

Join the conversation by attending events where you get to meet and talk with the experts from Anonyome Labs.

Never miss a blog update

Subscribe to our blog and stay updated on the latest industry insights, expert advice, and exclusive content delivered straight to your inbox.